Computer Science &Amp; Information Technology (CS &Amp; IT) 2018
DOI: 10.5121/csit.2018.81708
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Attacks on the Data Communication of Drones Monitoring Critical Infrastructure

Abstract: With the exponential growth in the digitalization of critical infrastructures such as nuclear plants and transmission and distribution grids, these systems have become more prone to coordinated cyber-physical attacks. One of the ways used to harden the security of these infrastructures is by utilizing UAVs for monitoring, surveillance and data collection.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…The integrity of the transmitted data is a crucial security and safety requirement of the UAV operation. The most common attacks targeting data integrity are Man-in-the-Middle attack [102], Replay attack [103], GPS and other Sensor Spoofing [104], and Hijacking attack [105]. Integrity attacks are carried out by either altering the transmitted data or inserting malicious data to overwrite the genuine data.…”
Section: Security and Safety Requirementsmentioning
confidence: 99%
See 2 more Smart Citations
“…The integrity of the transmitted data is a crucial security and safety requirement of the UAV operation. The most common attacks targeting data integrity are Man-in-the-Middle attack [102], Replay attack [103], GPS and other Sensor Spoofing [104], and Hijacking attack [105]. Integrity attacks are carried out by either altering the transmitted data or inserting malicious data to overwrite the genuine data.…”
Section: Security and Safety Requirementsmentioning
confidence: 99%
“…On a physical layer, the easiest way to disrupt communication is to execute a Jamming attack by overpowering the authentic radio signal with a stronger interfering signal of the same frequency, thus overriding the authentic signal and blocking the receiver from acquiring the intended data. If a Jamming attack is effective, UAV loses connection with GCS and goes into fail-safe mode, often returning back to the launch position [103]. Jammers can be proactive or reactive.…”
Section: Communication-based Vulnerabilities Threats and Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…e) Integrity solutions: Integrity can be ensured using signature, hash functions, message authentication code (MAC) and authenticated encryption cryptographic primitives [43], [44].…”
Section: Security Attacks On Mavlink Protocolmentioning
confidence: 99%
“…It aims to interrupt the drone communication using channel interference, data‐packet flooding, data collision, or extensive external noise such as denial of service/distributed denial of service attacks 28 . It is easily executable as it does not require any far‐reaching knowledge about the victim organization 29 …”
Section: Introductionmentioning
confidence: 99%